Comcast planning 8 million Wi-Fi hotspots in 19 major cities by year-end

image

The Comcast Wi-Fi network only encompasses 1 million hotspots right now, but that number will skyrocket to a whopping 8 million by year’s end, with the cable MSO promising to operate hotspots in 19 of the country’s 30 largest cities.

Cities targeted for new hotspot locations include Atlanta, Baltimore, Boston, Chicago, Denver, Detroit, Hartford, Houston, Indianapolis, Miami, Minneapolis, Nashville, Philadelphia, Pittsburgh, Portland, Sacramento, Salt Lake City, San Francisco, Seattle and Washington, D.C.

In a blog post, Marcien Jenckes, executive vice president of consumer services for Comcast Cable, said some 200 million out-of-home sessions have been initiated on the company’s Xfinity Wi-Fi network so far in 2014, a 650 percent year-over-year increase.

“Comcast customers now transmit nearly 2 million gigabytes (or half a million DVDs worth) of data through Comcast’s Wi-Fi hotspots each month,” Jenckes added.

Comcast’s hotspots are located at a mix of outdoor locations, businesses and residences.

One of the company’s more controversial efforts has been the creation of “neighborhood hotspots” via the inclusion of a second “xfinitywifi” signal (or SSID) in its residential customers’ home wireless gateways. The second signal provides visiting Xfinity Internet customers with Wi-Fi access without the need to use the homeowner’s private network password. Comcast said 54 percent of Xfinity neighborhood Wi-Fi usage already travels over the second SSID.

“Wi-Fi is part of our broader plan to deliver the fastest in-home and out-of-home Internet experience and power our customers’ growing number of devices and growing Internet use,” Jenckes said.

Though Comcast has indicated an interest in possibly launching a wireless service that would rely on a combination of Wi-Fi and back-up leased capacity on a cellular network, it and other U.S. cable MSOs are currently using Wi-Fi primarily to extend wireless connectivity to their nomadic broadband customers.

The cable industry’s need for Wi-Fi was stressed by other industry execs at this week’s 2014 Cable Show in Los Angeles, according to an article in FierceCable. “There’s so much we can do with Wi-Fi that it’s becoming very important in our new service offerings. It just gives our customers more flexibility,” said Yvette Kanouff, executive vice president of corporate engineering and technology for Cablevision Systems.

For more and the original story follow the source link below.

Source: FierceWireless

Sprint poised to become ‘king of data speed’

image

The TDD spectrum in the 2.5 GHz band that Sprint acquired from Clearwire last summer is “a powerful resource for Sprint to catch up to its competitors” and can enable the United States’ third-largest mobile operator “to provide super high speed data connections,” according to a report from Strategy Analytics.

The report, written by Guang Yang, Strategy Analytics’ senior analyst for wireless networks and platforms, further notes that Sprint’s 2.5 GHz spectrum is key to enabling the operator to become the “king of data speed.”

In February, Sprint along with Nokia Solutions and Networks demonstrated that a single sector of a TD-LTE network can deliver data throughput of 2.6 Gbps. In the test, 120 MHz of Sprint’s 2.5 GHz TDD spectrum was aggregated to achieve what the companies claim is a TD-LTE speed record. Sprint has said it owns around 120 MHz of 2.5 GHz spectrum in 90 percent of the top 100 U.S. markets.

“Sprint plans to deploy 2×20 MHz carrier aggregation in 2014 and 3×20 MHz carrier aggregation by EOY 2015. This should help Sprint to build strong momentum as a future LTE-Advanced competitor,” said Strategy Analytics.

However, the research firm’s report may not have been issued at the most opportune time for Sprint. The FCC has been reviewing the spectrum screen it uses when assessing industry mergers and acquisitions and whether spectrum caps are needed in the upcoming 600 MHz auctions in order to equalize spectrum holdings among U.S. mobile operators.

In both cases, Sprint has contended that its vast holdings of 2.5 GHz BRS and EBS spectrum should be not be compared directly to lower band spectrum held by the nation’s two largest operators, AT&T Mobility and Verizon Wireless. For example, in February, Sprint proposed the FCC adopt a “weighted wireless broadband spectrum screen” that would accord perceived competitive advantages to spectrum under 1 GHz.

“It should surprise no one that this approach would basically relieve Sprint from almost any meaningful spectrum aggregation constraints while effectively foreclosing AT&T from acquiring additional spectrum it needs to meet customers’ needs,” wrote Joan Marsh, AT&T vice president of federal regulatory, in a blog post last week.

Similarly, in an ex parte filing with the FCC last week, Verizon wrote: “Despite having no factual basis for continuing to exclude the majority of the 2.5 GHz spectrum, Sprint continues to argue for its exclusion in large part because it controls almost all of it. As a result, Sprint has, on average, nearly twice as much spectrum as Verizon Wireless.”

Meanwhile, Strategy Analytics also heralded Sprint’s Spark program, which was launched in October 2013. The tri-band LTE service employs the operator’s FDD LTE network in its 800 MHz and 1.9 GHz spectrum and its TD-LTE network in its 2.5 GHz spectrum, aggregating TD-LTE carriers in the 2.5 GHz band  to deliver 50-60 Mbps download data speeds. Sprint offers the technology in parts of 14 markets today and plans to bring the technology to the top 100 U.S. markets within three years. Sprint CEO Dan Hesse has said Sprint Spark could eventually offer real-world speeds of 150-180 Mbps.

According to Strategy Analytics: “The inherent tight interworking between LTE TDD and FDD enables Sprint to implement an integrated FDD/TDD network and to simultaneously provide both network coverage and capacity. LTE FDD at the lower frequency bands can provide nationwide coverage, while LTE TDD at the higher frequency band offers very high data speed throughput.”

In addition to supporting active handovers and session continuity between 800 MHz, 1900 MHz and 2.5 GHz bands, Sprint Spark could also enable more advanced functions, including support for real-time load balancing and traffic steering. “These two features would both increase the capacity of Sprint’s whole network and improve user experience over both FDD and TDD systems,” according to Strategy Analytics.

The research firm also recommended that operators worldwide look to Sprint Spark or the hybrid LTE network deployed in Japan by Sprint’s majority owner SoftBank for reference models “showing how to use TDD spectrum to complement LTE FDD by boosting data speed and capacity.”

Source: Fierce Wireless

Verizon spotted testing 80Mbps LTE network in New York

image

Verizon could be working on increasing the speed of its phone network in New York, by performing a new LTE rollout. The carrier has apparently been spotted operating a new LTE network, which is shown to be providing network speeds of around 80Mbps downstream, and peaking at almost 23Mbps for uploads.

Milan Milanovic told GigaOM that his spectrum analyzer showed the network as operating on the 2.1GHz Advanced Wireless Services band, and was able to be connected to using an iPhone 5s. The new connections could end up offering a 150Mbps theoretical maximum, with the carrier apparently deploying the network on 40MHz of spectrum in some areas thanks to the acquisition of 4G licenses from cable companies last year. It is thought that the 80Mbps achieved on the test network is due to either an artificial data rate restriction or an insufficient fiber backhaul.

The same high-speed network is apparently also being tested in Los Angeles in Chicago, though these rumors were not able to be confirmed to the same level as the New York trials. A launch date for the mystery network is also unknown.

Source: Electronista

US Carriers Verizon Wireless, AT&T, Sprint, T-Mobile 4G LTE Coverage (Maps)

image

4G LTE is the new kid on the mobile spectrum, which is looking to make your mobile life faster. But which US carrier has the fastest and most LTE coverage?

Verizon Wireless has been a pioneer in the penetration of LTE. The company has been aggressive at building new cell towers and expanding its coverage.

Big Red has put together new coverage maps which shows their LTE network coverage compared to AT&T, Sprint, and T-Mobile. To put the results bluntly, all I see is red!

image

Verizon LTE Coverage Map

image

AT&T LTE Coverage Map

image

Sprint LTE Coverage Map

image

T-Mobile LTE Coverage Map

Source: N4BB

Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight

image

A legal fight over the government’s use of a secret surveillance tool has provided new insight into how the controversial tool works and the extent to which Verizon Wireless aided federal agents in using it to track a suspect.

Court documents in a case involving accused identity thief Daniel David Rigmaiden describe how the wireless provider reached out remotely to reprogram an air card the suspect was using in order to make it communicate with the government’s surveillance tool so that he could be located.

Rigmaiden, who is accused of being the ringleader or a $4 million tax fraud operation, asserts in court documents that in July 2008 Verizon surreptitiously reprogrammed his air card to make it respond to incoming voice calls from the FBI and also reconfigured it so that it would connect to a fake cell site, or stingray, that the FBI was using to track his location.

Air cards are devices that plug into a computer and use the wireless cellular networks of phone providers to connect the computer to the internet. The devices are not phones and therefore don’t have the ability to receive incoming calls, but in this case Rigmaiden asserts that Verizon reconfigured his air card to respond to surreptitious voice calls from a landline controlled by the FBI.

The FBI calls, which contacted the air card silently in the background, operated as pings to force the air card into revealing its location.

In order to do this, Verizon reprogrammed the device so that when an incoming voice call arrived, the card would disconnect from any legitimate cell tower to which it was already connected, and send real-time cell-site location data to Verizon, which forwarded the data to the FBI. This allowed the FBI to position its stingray in the neighborhood where Rigmaiden resided. The stingray then “broadcast a very strong signal” to force the air card into connecting to it, instead of reconnecting to a legitimate cell tower, so that agents could then triangulate signals coming from the air card and zoom-in on Rigmaiden’s location.

To make sure the air card connected to the FBI’s simulator, Rigmaiden says that Verizon altered his air card’s Preferred Roaming List so that it would accept the FBI’s stingray as a legitimate cell site and not a rogue site, and also changed a data table on the air card designating the priority of cell sites so that the FBI’s fake site was at the top of the list.

Rigmaiden makes the assertions in a 369-page document he filed in support of a motion to suppress evidence gathered through the stingray. Rigmaiden collected information about how the stingray worked from documents obtained from the government, as well as from records obtained through FOIA requests filed by civil liberties groups and from open-source literature.

During a hearing in a US District Court in Arizona on March 28 to discuss the motion, the government did not dispute Rigmaiden’s assertions about Verizon’s activities.

The actions described by Rigmaiden are much more intrusive than previously known information about how the government uses stingrays, which are generally employed for tracking cell phones and are widely used in drug and other criminal investigations.

The government has long asserted that it doesn’t need to obtain a probable-cause warrant to use the devices because they don’t collect the content of phone calls and text messages and operate like pen-registers and trap-and-traces, collecting the equivalent of header information.

The government has conceded, however, that it needed a warrant in his case alone — because the stingray reached into his apartment remotely to locate the air card — and that the activities performed by Verizon and the FBI to locate Rigmaiden were all authorized by a court order signed by a magistrate.

The Electronic Frontier Foundation and the American Civil Liberties Union of Northern California, who have filed an amicus brief in support of Rigmaiden’s motion, maintain that the order does not qualify as a warrant and that the government withheld crucial information from the magistrate — such as identifying that the tracking device they planned to use was a stingray and that its use involved intrusive measures — thus preventing the court from properly fulfilling its oversight function.

“It shows you just how crazy the technology is, and [supports] all the more the need to explain to the court what they are doing,” says EFF Staff Attorney Hanni Fakhoury. “This is more than just [saying to Verizon] give us some records that you have sitting on your server. This is reconfiguring and changing the characteristics of the [suspect’s] property, without informing the judge what’s going on.”

The secretive technology, generically known as a stingray or IMSI catcher, allows law enforcement agents to spoof a legitimate cell tower in order to trick nearby mobile phones and other wireless communication devices like air cards into connecting to the stingray instead of a phone carrier’s legitimate tower.

When devices connect, stingrays can see and record their unique ID numbers and traffic data, as well as information that points to the device’s location.

By moving the stingray around and gathering the wireless device’s signal strength from various locations in a neighborhood, authorities can pinpoint where the device is being used with much more precision than they can get through data obtained from a mobile network provider’s fixed tower location.

Use of the spy technology goes back at least 20 years. In a 2009 Utah case, an FBI agent described using a cell site emulator more than 300 times over a decade and indicated that they were used on a daily basis by U.S, Marshals, the Secret Service and other federal agencies.

The FBI used a similar device to track former hacker Kevin Mitnick in 1994, though the version used in that case was much more primitive and passive.

A 1996 Wired story about the Mitnick case called the device a Triggerfish and described it as “a technician’s device normally used for testing cell phones.” According to the story, the Triggerfish was “a rectangular box of electronics about a half a meter high controlled by a PowerBook” that was essentially “a five-channel receiver, able to monitor both sides of a conversation simultaneously.” The crude technology was hauled around in a station wagon and van. A black coaxial cable was strung out of the vehicle’s window to connect the Triggerfish to a direction-finding antenna on the vehicle’s roof, which had four antenna prongs that reached 30 centimeters into the sky.

The technology has become much sleeker and less obtrusive since then, but still operates under the same principles.

In Rigmaiden’s case, agents apparently used two devices made by a Florida-based company called Harris. One was the company’s StingRay system, which is designed to work from a vehicle driven around a neighborhood to narrow a suspect’s location to a building. Once agents tracked the signals from Rigmaiden’s air card to the Domicilio Apartments complex in Santa Clara, California, they apparently used another device made by Harris called the — a handheld system that allowed them to walk through the complex and zero-in on Rigmaiden’s air card in apartment 1122.

Although a number of companies make stingrays, including Verint, View Systems, Altron, NeoSoft, MMI, Ability, and Meganet, the Harris line of cell site emulators are the only ones that are compatible with CDMA2000-based devices. Others can track GSM/UMTS-based communications, but the Harris emulators can track CDMA2000, GSM and iDEN devices, as well as UMTS. The Harris StingRay and KingFish devices can also support three different communication standards simultaneously, without having to be reconfigured.

Rigmaiden was arrested in 2008 on charges that he was the mastermind behind an operation that involved stealing more than $4 million in refunds from the IRS by filing fraudulent tax returns. He and others are accused of using numerous fake IDs to open internet and phone accounts and using more than 175 different IP addresses around the United States to file the fake returns, which were often filed in bulk as if through an automated process. Rigmaiden has been charged with 35 counts of wire fraud, 35 counts of identify theft, one count of unauthorized computer access and two counts of mail fraud.

image

The surveillance of Rigmaiden began in June 2008 when agents served Verizon with a grand jury subpoena asking for data on three IP addresses that were allegedly used to electronically file some of the fraudulent tax returns. Verizon reported back that the three IP addresses were linked to an air card account registered in the name of Travis Rupard — an identity that Rigmaiden allegedly stole. The air card was identified as a UTStarcom PC5740 device that was assigned a San Francisco Bay Area phone number.

A court order was then submitted to Verizon Wireless requiring the company to provide historical cell site data on the account for the previous 30 days to determine what cell towers the air card had contacted and determine its general location. Verizon responded by supplying the government with information that included the latitude and longitude coordinates for five cell sites in San Jose and Santa Clara cities, in the heart of Silicon Valley.

In July, the government served Verizon Wireless with another court order directing the company to assist the FBI in the use and monitoring of a mobile tracking device to locate an unidentified suspect. The order directed Verizon Wireless to provide the FBI with any “technical assistance needed to ascertain the physical location of the [air card]….”

The government has
fought hard to suppress information on how it uses stingrays, but in his motion to suppress, Rigmaiden lays out in great detail how the surveillance occurred and the nature of the technical assistance Verizon provided the FBI.

On the morning of July 14, 2008, FBI Agent Killigrew created a cell tower range chart/map consisting of a street map, plotted Verizon Wireless cell site sectors belonging to cell site Nos. 268, 139, and 279, and a triangulated aircard location signature estimate represented by a shaded area. On the chart/map, the total land area collectively covered by cell site Nos. 268, 139, and 279 is approximately 105,789,264 ft2. FBI Agent Killigrew used triangulation techniques and location signature techniques to eliminate 93.9% of that 105,789,264 ft2 area resulting in the location estimate being reduced to 6,412,224 ft2 represented by the shaded area. The shaded area on the cell tower range chart covers the location of apartment No. 1122 at the Domicilio apartment complex.

On July 15, agents with the FBI, IRS and US Postal Service flew to San Jose to triangulate Rigmaiden’s location using the stingray. They worked with technical agents from the San Francisco FBI’s Wireless Intercept and Tracking Team to conduct the real-time tracking.

According to Rigmaiden, the agents drove around the cell site areas gathering information about signal range and radio frequencies for each cell site sector. “The radio frequency information was needed so that the FBI technical agents could properly configure their StingRay and KingFish for use in cell site emulator mode,” Rigmaiden writes. “By referencing a list of all the radio frequencies already in use, the FBI was able to choose an unused frequency for use by its emulated cellular network that would not interfere with the various FCC licensed cellular networks already operating in the noted area.”

The next day, Verizon Wireless surreptitiously reprogrammed Rigmaiden’s air card so that it would recognize the FBI’s stingray as a legitimate cell site and connect to it “prior to attempting connections with actual Verizon Wireless cell sites.” The FBI needed Verizon to reprogram the device because it otherwise was configured to reject rogue, unauthorized cell sites, Rigmaiden notes.

On July 16, the FBI placed 32 voice calls to the air card between 11am and 5pm. Each time the air card was notified that a call was coming in, it dropped its data connection and went into idle mode. At the same time, it sent real-time cell site location information to Verizon, which forwarded the information to the FBI’s DCS-3000 servers, part of the elaborate digital collection system the FBI operates for wiretapping and pen-registers and trap-and-traces. From the FBI’s servers, the location data was transmitted wirelessly through a VPN to the FBI’s technical agents “lurking in the streets of Santa Clara” with the StingRay.

image

A stingray, made by Harris Corp. Image: U.S. Patent and Trademark Office

At this point, the StingRay took over and began to broadcast its signal to force the air card — and any other wireless devices in the area — to connect to it, so that agents could zoom-in on Rigmaiden’s location.

“Because the defendant attempted to keep his aircard continuously connected to the Internet, the FBI only had a very short window of time to force the aircard to handoff its signal to the StingRay after each surreptitious voice call [and] the FBI needed to repeatedly call the aircard in order to repeatedly boot it offline over the six hours of surreptitious phone calls,” Rigmaiden writes. “Each few minute window of time that followed each denial-of-service attack (i.e., surreptitious phone call) was used by the FBI to move its StingRay, while in cell site emulator mode, to various positions until it was close enough to the aircard to force an Idle State Route Update (i.e., handoff).”

Rigmaiden maintains that once the connection was made, the StingRay wrote data to the air card to extend the connection and also began to “interrogate” the air card to get it to broadcast its location. The FBI used the Harris AmberJack antenna to deliver highly-directional precision signals to the device, and moved the StingRay around to various locations in order to triangulate the precise location of the air card inside the Domicilio Apartments complex.

According to Rigmaiden, agents also transmitted Reverse Power Control bits to his air card to get it to transmit its signals at “a higher power than it would have normally transmitted if it were accessing cellular service through an actual Verizon Wireless cell site.”

Once agents had tracked the device to the Domicilio Apartments complex, they switched out the StingRay for the handheld KingFish device to locate Rigmaiden’s apartment within the complex.

Around 1am on July 17, an FBI agent sent a text message to another FBI agent stating, “[w]e are down to an apt complex….” By 2:42 am, one of the FBI technical agents sent a text message to someone stating that they had “[f]ound the card” and that agents were “working on a plan for arrest.”

Agents still didn’t know who was in the apartment — since Rigmaiden had used an assumed identity to lease the unit — but they were able to stake out the apartment complex and engage in more traditional investigative techniques to gather more intelligence about who lived in unit 1122. On August 3, while the apartment was still under surveillance, Rigmaiden left the unit. Agents followed him a short distance until Rigmaiden caught on that he was being followed. After a brief foot chase, he was arrested.

Rigmaiden and the American Civil Liberties Union and Electronic Frontier Foundation have argued that the government did not obtain a legitimate warrant to conduct the intrusive surveillance through the stingray. They say it’s indicative of how the government has used stingrays in other cases without proper disclosure to judges about how they work, and have asked the court to suppress evidence gathered through the use of the device.

U.S. District Court Judge David Campbell is expected to rule on the motion to suppress within a few weeks.

Source: Wired

AT&T Snags OnStar Wireless Contract From Verizon

AT&T Inc. is scoring a win over rival Verizon Wireless as it takes over the contract to supply wireless connections to cars with General Motors’ OnStar service.

Verizon Wireless and its predecessor companies have supplied the network for OnStar since the service launched in the 1990s, but AT&T will take over with the 2015 model year, AT&T and GM said Monday.
The news comes as cellphone companies are jostling to connect non-phone devices to their networks. Now that nearly everyone has a phone, the phone companies have to look elsewhere for growth. Dallas-based AT&T has been particularly aggressive in this area, garnering, for instance, the contract to connect Amazon Kindle e-readers.

AT&T will connect OnStar cars to its new “4G LTE” network, which can supply much higher data speeds than current OnStar connections. That means GM could deliver car software updates wirelessly, instead of making owners take their cars  to the shop. It could also enable video streaming for passengers, in-vehicle Wi-Fi “hotspots” and give GM a better view of what’s going on inside a car, and whether it needs maintenance. Owners might even be able to call up views from their car’s cameras, remotely.

“They’re basically smartphones on wheels,” said Glenn Lurie, head of AT&T’s “emerging devices” division.

Verizon has an LTE network that delivers speeds similar to AT&T’s, with wider coverage. Lurie said that by the time AT&T takes over the contract, its LTE network will cover 300 million Americans, or 96 percent of the population. It also has older, slower networks as a backup.

Verizon Wireless said it was looking forward to continuing to provide service to current OnStar customers.

AT&T and GM made the announcement just before the opening of Mobile World Congress, the world’s largest wireless trade show, in Barcelona. The companies didn’t reveal financial terms. The 6 million current OnStar users pay $19 per month or $199 per year, plus per-minute calling fees. Turn-by-turn GPS navigation costs extra, too.

British automotive research firm SBD believes that 100 million cars worldwide will have built-in wireless capabilities by 2015

Source: AP

T-Mobile to Test the Concept of Sharing Spectrum Between Federal and Commercial Users

The FCC has granted permission to T-Mobile USA to test the concept of sharing spectrum between federal and commercial users in the 1755-1780 MHz band. This is part of a government effort to use spectrum sharing technology to help meet mobile broadband demand.

The tests are aimed at measuring the impact spectrum sharing will have on commercial carriers looking to deploy LTE, which is basically every carrier in the US. Verizon, AT&T and now Sprint has started to deploy their LTE network with T-Mobile scheduled on building out their LTE network in 2013.

In a statement, FCC Chairman Julius Genachowski said that by granting the authorization, the commission “hopes to facilitate commercial mobile broadband services in that band, which would significantly benefit millions of U.S. wireless consumers and help drive the mobile innovation economy.” 

“As we move forward, we will continue to collaborate closely with key government agencies, including NTIA and the Department of Defense, as well as private sector partners, to gain greater spectrum efficiency and unlock the many potential benefits of government-commercial spectrum sharing,” Genachowski said.

The CTIA has specially cited the 1755-1780 MHz band as a spectrum band that could be cleared and paired with other AWS spectrum.